Analysis
-
max time kernel
2s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 10:37
Static task
static1
Behavioral task
behavioral1
Sample
17c45cf65758d32945a2a4a54023c5e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17c45cf65758d32945a2a4a54023c5e4.exe
Resource
win10v2004-20231215-en
General
-
Target
17c45cf65758d32945a2a4a54023c5e4.exe
-
Size
1.7MB
-
MD5
17c45cf65758d32945a2a4a54023c5e4
-
SHA1
818c297d28a0fe90ecddf1702c12add295879fb9
-
SHA256
4419f250749ada6e8a0d565652828019dddb5b1a5a4e0aa339972120fa2477af
-
SHA512
6cebec9983ca0e473d7936415a1d68cb6b288b104b5a8e670f9ee1752fbf8a10e3d0be32e9f5941c3e83ca7b773fd0af839651f3c9738fa11fa204b18534d0a0
-
SSDEEP
24576:UuhaseZJ8NI85eZJ8NI8DerQZb+md4wm2eZJ8NI85eZJ8NI8DerQZb+md4wmJdt4:bk8u8DerQZbd2r8u8DerQZbd2VdG
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 17c45cf65758d32945a2a4a54023c5e4.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Help\HelpCat.exe 17c45cf65758d32945a2a4a54023c5e4.exe File opened for modification C:\Windows\Help\HelpCat.exe 17c45cf65758d32945a2a4a54023c5e4.exe File created C:\Windows\Sysinf.bat 17c45cf65758d32945a2a4a54023c5e4.exe File created C:\Windows\regedt32.sys 17c45cf65758d32945a2a4a54023c5e4.exe File opened for modification C:\Windows\system\KavUpda.exe 17c45cf65758d32945a2a4a54023c5e4.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1596 sc.exe 2404 sc.exe 3008 sc.exe 2876 sc.exe 768 sc.exe 2128 sc.exe 1112 sc.exe 1004 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 1884 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1760 17c45cf65758d32945a2a4a54023c5e4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2684 1760 17c45cf65758d32945a2a4a54023c5e4.exe 20 PID 1760 wrote to memory of 2684 1760 17c45cf65758d32945a2a4a54023c5e4.exe 20 PID 1760 wrote to memory of 2684 1760 17c45cf65758d32945a2a4a54023c5e4.exe 20 PID 1760 wrote to memory of 2684 1760 17c45cf65758d32945a2a4a54023c5e4.exe 20 PID 1760 wrote to memory of 2788 1760 17c45cf65758d32945a2a4a54023c5e4.exe 16 PID 1760 wrote to memory of 2788 1760 17c45cf65758d32945a2a4a54023c5e4.exe 16 PID 1760 wrote to memory of 2788 1760 17c45cf65758d32945a2a4a54023c5e4.exe 16 PID 1760 wrote to memory of 2788 1760 17c45cf65758d32945a2a4a54023c5e4.exe 16 PID 2788 wrote to memory of 2780 2788 net.exe 17 PID 2788 wrote to memory of 2780 2788 net.exe 17 PID 2788 wrote to memory of 2780 2788 net.exe 17 PID 2788 wrote to memory of 2780 2788 net.exe 17 PID 1760 wrote to memory of 2736 1760 17c45cf65758d32945a2a4a54023c5e4.exe 74 PID 1760 wrote to memory of 2736 1760 17c45cf65758d32945a2a4a54023c5e4.exe 74 PID 1760 wrote to memory of 2736 1760 17c45cf65758d32945a2a4a54023c5e4.exe 74 PID 1760 wrote to memory of 2736 1760 17c45cf65758d32945a2a4a54023c5e4.exe 74 PID 1760 wrote to memory of 2764 1760 17c45cf65758d32945a2a4a54023c5e4.exe 73 PID 1760 wrote to memory of 2764 1760 17c45cf65758d32945a2a4a54023c5e4.exe 73 PID 1760 wrote to memory of 2764 1760 17c45cf65758d32945a2a4a54023c5e4.exe 73 PID 1760 wrote to memory of 2764 1760 17c45cf65758d32945a2a4a54023c5e4.exe 73 PID 1760 wrote to memory of 2676 1760 17c45cf65758d32945a2a4a54023c5e4.exe 71 PID 1760 wrote to memory of 2676 1760 17c45cf65758d32945a2a4a54023c5e4.exe 71 PID 1760 wrote to memory of 2676 1760 17c45cf65758d32945a2a4a54023c5e4.exe 71 PID 1760 wrote to memory of 2676 1760 17c45cf65758d32945a2a4a54023c5e4.exe 71 PID 1760 wrote to memory of 3028 1760 17c45cf65758d32945a2a4a54023c5e4.exe 69 PID 1760 wrote to memory of 3028 1760 17c45cf65758d32945a2a4a54023c5e4.exe 69 PID 1760 wrote to memory of 3028 1760 17c45cf65758d32945a2a4a54023c5e4.exe 69 PID 1760 wrote to memory of 3028 1760 17c45cf65758d32945a2a4a54023c5e4.exe 69 PID 1760 wrote to memory of 2800 1760 17c45cf65758d32945a2a4a54023c5e4.exe 66 PID 1760 wrote to memory of 2800 1760 17c45cf65758d32945a2a4a54023c5e4.exe 66 PID 1760 wrote to memory of 2800 1760 17c45cf65758d32945a2a4a54023c5e4.exe 66 PID 1760 wrote to memory of 2800 1760 17c45cf65758d32945a2a4a54023c5e4.exe 66 PID 1760 wrote to memory of 2572 1760 17c45cf65758d32945a2a4a54023c5e4.exe 64 PID 1760 wrote to memory of 2572 1760 17c45cf65758d32945a2a4a54023c5e4.exe 64 PID 1760 wrote to memory of 2572 1760 17c45cf65758d32945a2a4a54023c5e4.exe 64 PID 1760 wrote to memory of 2572 1760 17c45cf65758d32945a2a4a54023c5e4.exe 64 PID 1760 wrote to memory of 2648 1760 17c45cf65758d32945a2a4a54023c5e4.exe 62 PID 1760 wrote to memory of 2648 1760 17c45cf65758d32945a2a4a54023c5e4.exe 62 PID 1760 wrote to memory of 2648 1760 17c45cf65758d32945a2a4a54023c5e4.exe 62 PID 1760 wrote to memory of 2648 1760 17c45cf65758d32945a2a4a54023c5e4.exe 62 PID 3028 wrote to memory of 2988 3028 net.exe 61 PID 3028 wrote to memory of 2988 3028 net.exe 61 PID 3028 wrote to memory of 2988 3028 net.exe 61 PID 3028 wrote to memory of 2988 3028 net.exe 61 PID 2572 wrote to memory of 380 2572 net.exe 58 PID 2572 wrote to memory of 380 2572 net.exe 58 PID 2572 wrote to memory of 380 2572 net.exe 58 PID 2572 wrote to memory of 380 2572 net.exe 58 PID 2648 wrote to memory of 1880 2648 net.exe 136 PID 2648 wrote to memory of 1880 2648 net.exe 136 PID 2648 wrote to memory of 1880 2648 net.exe 136 PID 2648 wrote to memory of 1880 2648 net.exe 136 PID 2800 wrote to memory of 3004 2800 net.exe 59 PID 2800 wrote to memory of 3004 2800 net.exe 59 PID 2800 wrote to memory of 3004 2800 net.exe 59 PID 2800 wrote to memory of 3004 2800 net.exe 59 PID 1760 wrote to memory of 2992 1760 17c45cf65758d32945a2a4a54023c5e4.exe 137 PID 1760 wrote to memory of 2992 1760 17c45cf65758d32945a2a4a54023c5e4.exe 137 PID 1760 wrote to memory of 2992 1760 17c45cf65758d32945a2a4a54023c5e4.exe 137 PID 1760 wrote to memory of 2992 1760 17c45cf65758d32945a2a4a54023c5e4.exe 137 PID 2676 wrote to memory of 820 2676 cmd.exe 144 PID 2676 wrote to memory of 820 2676 cmd.exe 144 PID 2676 wrote to memory of 820 2676 cmd.exe 144 PID 2676 wrote to memory of 820 2676 cmd.exe 144 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 1576 attrib.exe 2072 attrib.exe 788 attrib.exe 1648 attrib.exe 2544 attrib.exe 1160 attrib.exe 1688 attrib.exe 1628 attrib.exe 2792 attrib.exe 2580 attrib.exe 1876 attrib.exe 876 attrib.exe 344 attrib.exe 1444 attrib.exe 2596 attrib.exe 2076 attrib.exe
Processes
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y2⤵PID:2780
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat1⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\17c45cf65758d32945a2a4a54023c5e4.exe"C:\Users\Admin\AppData\Local\Temp\17c45cf65758d32945a2a4a54023c5e4.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:2992
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y3⤵PID:2316
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:1656
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:1472
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Runs regedit.exe
PID:1884
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:1596
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:2404
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:2156
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1260
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2004
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:1720
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:1616
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:768
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:2128
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1112
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1004
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:852
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:352
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:592
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:2892
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:1976
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 1:00:48 AM C:\Windows\Sysinf.bat3⤵PID:2264
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 12:57:48 AM C:\Windows\Sysinf.bat3⤵PID:2244
-
-
C:\Windows\SysWOW64\At.exeAt.exe 12:58:46 AM C:\Windows\Help\HelpCat.exe3⤵PID:2228
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:576
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:800
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1644
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1544
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2916
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2796
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2388
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1880
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2992
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2868
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:820
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2772
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1136
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1376
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2932
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2080
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2228
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2300
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:652
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:852
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1160
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1496
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2936
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:108
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1156
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1624
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1688
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1224
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1232
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:280
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1516
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2524
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:3008
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2876
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵
- Suspicious use of WriteProcessMemory
PID:2648
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵
- Suspicious use of WriteProcessMemory
PID:2572
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵
- Suspicious use of WriteProcessMemory
PID:2800
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:3028
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 1:00:45 AM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2676
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 12:57:45 AM C:\Windows\Sysinf.bat2⤵PID:2764
-
-
C:\Windows\SysWOW64\At.exeAt.exe 12:58:43 AM C:\Windows\Help\HelpCat.exe2⤵PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\17c45cf65758d32945a2a4a54023c5e4~4.exe17c45cf65758d32945a2a4a54023c5e4~4.exe2⤵PID:2260
-
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:1332
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y2⤵PID:2024
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat1⤵PID:1272
-
C:\Windows\SysWOW64\at.exeat 12:57:45 AM C:\Windows\Sysinf.bat1⤵PID:2636
-
C:\Windows\SysWOW64\at.exeat 1:00:45 AM C:\Windows\Sysinf.bat1⤵PID:820
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1880
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:1876
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:3004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:2988
-
C:\Windows\SysWOW64\at.exeat 1:00:48 AM C:\Windows\Sysinf.bat1⤵PID:880
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:344
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2408
-
C:\Windows\SysWOW64\at.exeat 12:57:48 AM C:\Windows\Sysinf.bat1⤵PID:1412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:600
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1444
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2792
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2580
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:3008
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2072
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2544
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2076
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:788
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:876
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1628
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e7d7ec66bd61fac3843c98650b0c68f6
SHA1a15ae06e1be51038863650746368a71024539bac
SHA2566475d5ecc14fea090774be55723d2d52b7ec7670527a7dbd61edf28c77944cb8
SHA512ac9e9893f5a0af03957731445f63279085f164e9a968d706a99d13012e4459314a7ccc32dc48f62379d69e21a0953c13543c9ded38b5ad5fbc346aa442af1ae6
-
Filesize
381KB
MD5045d671d4b5c9d1502c5e229dbfa0a47
SHA19112037ef009e53b36acdcf7435db2a438e1d72a
SHA25601afeed4238d3206ca41b70acd99a7961431ac741972da7052837b48aa22488b
SHA5124d028adc29f9aa09991efc75871ae29aa714c52eed5b2ebe56f9452b371b0e0ba4c13b55262f9ea74a58a7d9399e4174de9603389459c4214f65fd69b94dea8c
-
Filesize
123B
MD5872f90ca85f69ec8a9d810473ac9802c
SHA13df32ff73f98ef05e877613ce770ecb2e927488f
SHA256ea4a78453a64e8ec93e94f5977d8b684eb3b52107bf62d711f167b176f71551a
SHA512f051a25befd41f5acbd781683a5f6a2b09b6700b2609d1704016d658e6c84996e18f49c144c0e722296651297a3a90ece56cfa679a8f923abba65e6a8ca4a090